无线传感器网络中能量优化与安全方案研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
无线传感器网络是以应用为目标的网络。随着半导体硬件制造工艺的提升以及操作系统、网络协议等研究领域诸多创新性成果的提出,无线传感器网络技术逐渐发展为适用于各式各样需求的技术,且成为未来物联网发展的主要支撑。早期无线传感器网络的协议设计注重实现网络广泛部署和自组织等功能,没有将安全机制作为考虑因素。现今,无线传感器网络深入应用到工业、农业、军事等各个领域,安全问题造成的后果日益严重,无线传感器网络的安全方案也就成为研究人员关注的热点和难点。
     近年来,通过移植传统无线网络的已有算法、分析前人提出算法中的安全问题以及设计和实现新方案三种方式,研究人员已经提出包括密钥管理、安全路由、安全认证和可靠传输等安全方案。但是,保障安全必然以牺牲能量开销为代价,设计算法考虑安全性的同时如何去寻找“节能”和“安全”的平衡将是未来无线传感器网络安全方案研究的方向,也是本文要解决的主要问题。
     本文深入分析无线传感器网络安全算法及其能量开销问题,设计和实现一系列保障无线传感器网络安全建立和运行的能量优化安全方案:
     1.提出一种基于非均匀分布的能量优化安全路由协议。
     针对无线传感器网络已有安全路由算法因能耗不均衡导致的“能量空洞”(也称“路由空洞”)问题,提出一种层簇式结构下通过非均匀分簇实现协议能量优化的安全路由协议。协议在簇头选举过程中引入边缘度参数、在簇建立过程中采用最小能耗路径思想以及在簇头骨干网生成过程中引入能耗比参数,实现路径建立过程的能量优化。同时,协议通过路径建立过程中的消息交互机制,在不增加任何路由通信消息的基础上,实现基于秘密共享信息的节点安全认证方案,有效阻止攻击者对网络的被动攻击和主动攻击。仿真实验结果证明,本安全路由协议在保证网络的安全通信的同时实现了网络的均衡能耗,解决“能量空洞”问题。
     2.提出一种无线传感器网络批处理安全认证方案。
     针对无线传感器网络中实现汇聚节点对整个网络的安全认证需要较多通信开销并且带来极大网络时延的问题,本方案采用基于椭圆曲线双线性对运算的批处理思想提出一种批处理安全认证方案,克服无线传感器网络中汇聚节点对网络认证困难的问题。本方案中只需普通节点生成认证请求消息发送到汇聚节点,无需消息交互的能量开销,大量节约通信能耗。同时,批处理的方法使得汇聚节点认证请求的验证同节点的数量和密度无关,极大降低了网络的认证时延。最后,本方案对基于身份的攻击,如仿冒攻击和Sybil攻击等具备一定的抵抗能力。仿真实验的结果表明本方案可以有效降低网络能耗、减少网络时延以及抵御基于身份的攻击。
     3.提出一种无线传感器网络自适应可靠传输方案。
     针对节点资源受限和网络链路质量下降对数据传输的影响,本文提出一种自适应可靠传输方案。数据传输可靠性决定无线传感器网络的可用性。本方案基于网络参与率和融合数据的联合信息熵,实现重传和多路径自适应调整的可靠传输机制,克服了节点失效以及链路误码率对网络可靠传输的影响。方案中根节点统计信源节点参与率表征网络的可靠性,中间节点计算联合信息熵确定消息冗余机制实现数据的可靠传输。仿真实验证明,本方案在保证网络数据可靠传输的同时,相比Cushion协议对消息冗余实现优化,并且对基于传输的攻击,如Black hole攻击、Sink hole攻击具备一定抵抗能力。
     4.验证系统的设计和实现。
     本文基于本实验室开发的无线传感器网络智能农业监控平台,设计和实现无线传感器网络异常节点检测系统对提出的研究成果进行验证,并将批处理安全认证方案以及自适应可靠传输方案部署到该系统。验证系统的实验结果表明,本文方案能够保证合法节点的安全接入的同时有效抵御非法节点的攻击行为。
Wireless sensor network is a technology with the goal of application. Due to the manufacturing process improvement of hardware and all the breakthroughs in the design of operation system or network protocols, wireless sensor network turns to be suitable for any kinds of indeed needs, and also becomes one of the most important technologies for the development of Internet of Things. In the beginning, designers only focused on the implement of widespread deployment and self-organization of the network, security issues had not been taken into consideration. Recently, wireless sensor network has been applied to industry and agriculture, military and other fields, security leaks lead to more serious consequences ever. Thus, the research of wireless sensor network security schemes becomes the hot and also difficult topic nowadays.
     By transplanting the algorithms for other traditional network, analyzing security issues in pre-designed protocols for wireless sensor network, or designing brand new security schemes, researchers focused on this field have already proposed many security mechanisms as key management, security routing, security authentication or reliable transport. As we can see, enhancing the security of the network indeed will scarify the energy consumption. So, how to balance the "energy consumption" and "security issue" is the most important research direction in the future, and also the main problem we are going to solve in this paper.
     In this paper, we deeply analyze the wireless sensor network security schemes and mainly focus on the energy consumption of them. Base on the research results, we design and implement three security schemes as follows.
     1. Energy optimized secure routing protocol based on uneven distribution for wireless sensor network.
     In order to solve the "energy black hole" problem caused by uneven energy consumption in wireless sensor network, we propose an energy-optimized secure routing protocol based on uneven distribution. In the process we introduce degree of edge parameters in cluster head election, the minimum energy consumption path mechanism in inter-cluster network establishment and energy consumption ratio parameters in inner-cluster network establishment to implement energy optimization in routing establishment. In the meantime, we also design a node authentication scheme based on secret sharing information, which brings no more message interactions at all, to implement the enhancement of the network. The node authentication scheme is proved to be an effective method to prevent the network from passive attacks and active attacks. Our proposal ensures the safety of network communication and it also balances the energy consumption of the entire network, prolongs the life-time of the network, which means solves the "energy black hole" problem.
     2. Secure authentication scheme based on batch verification for wireless sensor network.
     Most of the secure authentication schemes for wireless sensor networks are aiming at peer-to-peer authentication or sink node broadcast authentication, due to the energy restriction of sensor nodes, it is difficult to implement a scheme that the sink node can verify all the normal nodes for secure authentication, which will bring a lot of communication consumption and network delay. Our scheme is based on the idea of batch verification to implement sink node to normal nodes mode secure authentication. In the proposal, the only communication consumption is that normal nodes need to sign the message to form an authentication request and send to sink node. Our scheme can effectively reduce the communication consumption. At the same time, the time consumption is unrelated to the density of the nodes, which greatly reduces the network authentication delay. What is more, our proposal also has the ability to resist attacks based on identity, which like fake identity attack and Sybil attack.
     3. Adaptive reliable transport scheme for wireless sensor network. The reliability of the data transportation in wireless sensor network determines the availability of network. In order to reduce the affects of data transportation from node failure or the decrease of the quality of the network link, we propose an adaptive reliable transport scheme. Our proposal based on the parameters of node participation ratio and data fusion average joint entropy, to implement a reliable data transport scheme which can adaptively decide to use retransmission mechanism or multi-path mechanism. In our proposal, sink node compute the node participation ratio to evaluate the network transport reliability, and intermediate node compute data fusion average joint entropy to adaptively decide the transport mechanism. Our scheme can effectively ensure the reliability of data transportation in wireless sensor network. And also, compared to another protocol Cushion, our proposal reduces the energy consumption and can prevent the network from attacks based on transportation, which like Black hole attack, Sink hole attack.
     4. Design and implementation of the verification system.
     At last, we design a wireless sensor network malicious node detection system based on the wireless sensor network intelligent monitor and control platform for agriculture which is developed in our lab. And we implement the schemes we proposed in chapter three and chapter four into in. The experimental results show that authentication system can effectively ensure legal node to security access the network and in the meantime prevent the network from illegal attacks.
引文
[1]Yick J, Mukherjee B, Ghosal D. Wireless sensor network survey[J]. Computer networks,2008,52(12):2292-2330.
    [2]Jianzhong L, Hong G. Survey on sensor network research[J]. Journal of Computer Research and Development,2008,45(1):1-15.
    [3]Bojkovic Z, Bakmaz B. A survey on wireless sensor networks deployment[J]. WSEAS Transactions on Communications,2008,7(12):1172-1181.
    [4]Akyildiz I F, Melodia T, Chowdury K R. Wireless multimedia sensor networks: A survey[J]. Wireless Communications, IEEE,2007,14(6):32-39.
    [5]Garcia-Hernandez C F, Ibarguengoytia-Gonzalez P H, Garcia-Hernandez J, et al. Wireless sensor networks and applications:a survey[J]. IJCSNS International Journal of Computer Science and Network Security,2007,7(3):264-273.
    [6]Yu M, Mokhtar H, Merabti M. A survey of network management architecture in wireless sensor network:Proceedings of the Sixth Annual Post-Graduate Symposium on The Convergence of Telecommunications, Networking and Broadcasting,2006[C].
    [7]Li M, Yang B. A survey on topology issues in wireless sensor network: Proceedings of the International Conference on Wireless Networks,2006[C].
    [8]Akyildiz IF, Su W, Sankarasubramaniam Y, et al. Wireless sensor networks:a survey[J]. Computer networks,2002,38(4):393-422.
    [9]Vieira M A M, Coelho Jr C N, Da Silva Jr D C, et al. Survey on wireless sensor network devices:Emerging Technologies and Factory Automation,2003. Proceedings. ETFA'03. IEEE Conference,2003 [C]. IEEE.
    [10]Bulusu N, Jha S. Wireless sensor networks[M]. Artech House,2005.
    [11]Vieira M A M, Coelho Jr C N, Da Silva Jr D C, et al. Survey on wireless sensor network devices:Emerging Technologies and Factory Automation,2003. Proceedings. ETFA'03. IEEE Conference,2003 [C]. IEEE.
    [12]Bojkovic Z, Bakmaz B. A survey on wireless sensor networks deployment[J]. WSEAS Transactions on Communications,2008,7(12):1172-1181.
    [13]Pantazis N A, Vergados D D. A survey on power control issues in wireless sensor networks[J]. Communications Surveys & Tutorials, IEEE, 2007,9(4):86-107.
    [14]Dilin G. Survey on routing protocols in wireless sensor networks[J]. World Sci-tech R & D,2005,4-22.
    [15]Bhatti S, Xu J. Survey of target tracking protocols using wireless sensor network:Wireless and Mobile Communications,2009. ICWMC'09. Fifth International Conference on,2009 [C]. IEEE.
    [16]Mao G, Fidan B, Anderson B. Wireless sensor network localization techniques[J]. Computer networks,2007,51(10):2529-2553.
    [17]Guanlin K, Fubao W, Weijun D. Survey on time synchronization for wireless sensor networks[J]. Computer Measurement & Control,2005,13:1021-1023.
    [18]Zhu Z, Tan Q, Zhu P. A Survey of WSN Security Research[J]. Computer Engineering & Science,2008,30(4):102-103.
    [19]Pandey A, Tripathi R C. A survey on wireless sensor networks security[J]. Journal of Computer Application,2010,3(2):44-49.
    [20]Potdar V, Sharif A, Chang E. Wireless sensor networks:A survey:Advanced Information Networking and Applications Workshops,2009. WAINA'09. International Conference on,2009[C]. IEEE.
    [21]乔晓军,张馨,王成,等.无线传感器网络在农业中的应用[J].农业工程学报,2005,21(2):232-234.
    [22]de Los Angeles Cosio Leon M, Hipolito J I N, Garcia J L. A security and privacy survey for WSN in e-health applications:Electronics, Robotics and Automotive Mechanics Conference,2009. CERMA'09.,2009[C]. IEEE.
    [23]Lee S H, Lee S, Song H, et al. Wireless sensor network design for tactical military applications:remote large-scale environments:Military Communications Conference,2009. MILCOM 2009. IEEE,2009[C]. IEEE.
    [24]Bahrepour M, Meratnia N, Poel M, et al. Distributed event detection in wireless sensor networks for disaster management:Intelligent Networking and Collaborative Systems (INCOS),2010 2nd International Conference on, 2010[C]. IEEE.
    [25]Ishmanov F, Malik A S, Kim S W. Energy consumption balancing (ECB) issues and mechanisms in wireless sensor networks (WSNs):a comprehensive overview[J]. European Transactions on Telecommunications, 2011,22(4):151-167.
    [26]Hu F, Cao X. Wireless sensor networks:principles and practice[M]. Auerbach Publications,2010.
    [27]姜连祥,汪小燕.无线传感器网络硬件设计综述[J].单片机与嵌入式系统应用,2006,11(13.136).
    [28]Pantazis N A, Vergados D D. A survey on power control issues in wireless sensor networks[J]. Communications Surveys & Tutorials, IEEE, 2007,9(4):86-107.
    [29]张志东,孙雨耕,刘洋,等.无线传感器网络能量模型[J][J].天津大学学报,2007,40(9):1029-1034.
    [30]Wang Y, Attebury G, Ramamurthy B. A survey of security issues in wireless sensor networks[J].2006.
    [31]Zhou Y, Fang Y, Zhang Y. Securing wireless sensor networks:a survey[J]. Communications Surveys & Tutorials, IEEE,2008,10(3):6-28.
    [32]郎为民,杨宗凯,吴世忠,等.无线传感器网络安全研究[J].计算机科学,2005,32(5):54-58.
    [33]Raymond D R, Midkiff S F. Denial-of-service in wireless sensor networks: Attacks and defenses[J]. Pervasive Computing, IEEE,2008,7(1):74-81.
    [34]Ransom S, Pfisterer D, Fischer S. Comprehensible security synthesis for wireless sensor networks:Proceedings of the 3rd international Workshop on Middleware for Sensor Networks,2008[C]. ACM.
    [35]Dimitrievski A, Pejovska V, Davcev D. Security Issues and Approaches in WSN[J]. Department of Computer Science, Faculty of Electrical Engineering and Information Technology, Republic of Macedonia, Skopje,2011.
    [36]Stankovic J A. Research challenges for wireless sensor networks[J]. ACM SIGBED Review,2004,1(2):9-12.
    [37]Akkaya K, Younis M. A survey on routing protocols for wireless sensor networks[J]. Ad hoc networks,2005,3(3):325-349.
    [38]Kumarawadu P, Dechene D J, Luccini M, et al. Algorithms for node clustering in wireless sensor networks:A survey:Information and Automation for Sustainability,2008. ICIAFS 2008.4th International Conference on,2008[C]. IEEE.
    [39]Stavrou E, Pitsillides A. A survey on secure multipath routing protocols in WSNs[J]. Computer Networks,2010,54(13):2215-2238.
    [40]Al-Karaki J N, Kamal A E. Routing techniques in wireless sensor networks:a survey[J]. Wireless Communications, IEEE,2004,11(6):6-28.
    [41]Srinath R, Reddy A V, Srinivasan R. Ac:Cluster based secure routing protocol for wsn:Networking and Services,2007. ICNS. Third International Conference on,2007[C]. IEEE.
    [42]Ding W, Iyengar S S, Kannan R, et al. Energy equivalence routing in wireless sensor networks[J]. Microprocessors and Microsystems,2004,28(8):467-475.
    [43]Busnel Y, Bertier M, Fleury E, et al. GCP:gossip-based code propagation for large-scale mobile wireless sensor networks:Proceedings of the 1st international conference on Autonomic computing and communication systems, 2007[C]. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).
    [44]Stojmenovic I, Lin X. Loop-free hybrid single-path/flooding routing algorithms with guaranteed delivery for wireless networks[J]. Parallel and Distributed Systems, IEEE Transactions on,2001,12(10):1023-1032.
    [45]Manjeshwar A, Agrawal D P. TEEN:a routing protocol for enhanced efficiency in wireless sensor networks:Proceedings of the 15th International Parallel & Distributed Processing Symposium,2001[C].
    [46]Younis O, Fahmy S. HEED:a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks[J]. Mobile Computing, IEEE Transactions on,2004,3(4):366-379.
    [47]Yuefeng W Z J. Improvement of LEACH in wireless sensor networks based on balanced energy strategy[J]. Journal of Southeast University (Natural Science Edition),2008,38.
    [48]Lindsey S, Raghavendra C S. PEGASIS:Power-efficient gathering in sensor information systems:Aerospace conference proceedings,2002. IEEE,2002[C]. IEEE.
    [49]Ye M, Li C, Chen G, et al. EECS:an energy efficient clustering scheme in wireless sensor networks:Performance, Computing, and Communications Conference,2005. IPCCC 2005.24th IEEE International,2005[C]. IEEE.
    [50]Chen G, Li C, Ye M, et al. An unequal cluster-based routing protocol in wireless sensor networks[J]. Wireless Networks,2009,15(2):193-207.
    [51]Tanachaiwiwat S, Dave P, Bhindwale R, et al. Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks: Performance, Computing, and Communications,2004 IEEE International Conference on,2004[C]. IEEE.
    [52]Deng J, Han R, Mishra S. INSENS:Intrusion-tolerant routing for wireless sensor networks[J]. Computer Communications,2006,29(2):216-230.
    [53]Wood A D, Fang L, Stankovic J A, et al. SIGF:a family of configurable, secure routing protocols for wireless sensor networks:Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks,2006 [C]. ACM.
    [54]Ren K, Yu S, Lou W, et al. Multi-user broadcast authentication in wireless sensor networks[J]. Vehicular Technology, IEEE Transactions on, 2009,58(8):4554-4564.
    [55]Jiang C, Li B, Xu H. An efficient scheme for user authentication in wireless sensor networks:Advanced Information Networking and Applications Workshops,2007, AINAW'07.21st International Conference on,2007[C]. IEEE.
    [56]Ren K, Lou W, Zeng K, et al. On broadcast authentication in wireless sensor networks[J]. Wireless Communications, IEEE Transactions on, 2007,6(11):4136-4144.
    [57]Zhang J, Yu W, Liu X. CRTBA:Chinese remainder theorem-based broadcast authentication in wireless sensor networks:Computer Network and Multimedia Technology,2009. CNMT 2009. International Symposium on,2009 [C]. IEEE.
    [58]Watro R, Kong D, Cuti S, et al. TinyPK:securing sensor networks with public key technology:Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks,2004[C]. ACM.
    [59]Benenson Z, Gedicke N, Raivio O. Realizing robust user authentication in sensor networks[J]. Real-World Wireless Sensor Networks (REALWSN), 2005,14.
    [60]Malone-Lee J. Identity-based signcryption[Z]. Cryptology ePrint Archive, Report 2002/098,2002.
    [61]Bauer K, Lee H. A distributed authentication scheme for a wireless sensing system[J]. ACM Transactions on Information and System Security, 2008,11(3):1-35.
    [62]Perrig A, Szewczyk R, Tygar J D, et al. SPINS:Security protocols for sensor networks[J]. Wireless networks,2002,8(5):521-534.
    [63]Wang C, Sohraby K, Li B, et al. A survey of transport protocols for wireless sensor networks[J], Network, IEEE,2006,20(3):34-40.
    [64]Sankarasubramaniam Y, Akan O B, Akyildiz I F. ESRT:event-to-sink reliable transport in wireless sensor networks:Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing,2003 [C]. ACM.
    [65]Intanagonwiwat C, Govindan R, Estrin D, et al. Directed diffusion for wireless sensor networking[J]. Networking, IEEE/ACM Transactions on, 2003,11(1):2-16.
    [66]Ganesan D, Govindan R, Shenker S, et al. Highly-resilient, energy-efficient multipath routing. in wireless sensor networks[J]. ACM SIGMOBILE Mobile Computing and Communications Review,2001,5(4):11-25.
    [67]Nath S, Gibbons P B, Seshan S, et al. Synopsis diffusion for robust aggregation in sensor networks:Proceedings of the 2nd international conference on Embedded networked sensor systems,2004[C]. ACM.
    [68]Heinzelman W R, Kulik J, Balakrishnan H. Adaptive protocols for information dissemination in wireless sensor networks:Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking, 1999[C].ACM.
    [69]Braginsky D, Estrin D. Rumor routing algorthim for sensor networks: Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications,2002[C]. ACM.
    [70]So J, Kim J, Gupta I. Cushion:Autonomically adaptive data fusion in wireless sensor networks:Mobile Adhoc and Sensor Systems Conference,2005. IEEE International Conference on,2005 [C]. IEEE.
    [71]Cordeiro C D M, Agrawal D P. Ad hoc and sensor networks:theory and applications[M]. World Scientific,2011.
    [72]Atzori L, Iera A, Morabito G. The internet of things:A survey[J]. Computer Networks,2010,54(15):2787-2805.
    [73]Shafiullah G M, Gyasi-Agyei A, Wolfs P J. A survey of energy-efficient and QoS-aware routing protocols for wireless sensor networks[M]//Novel Algorithms and Techniques In Telecommunications, Automation and Industrial Electronics. Springer,2008:352-357.
    [74]Al-Karaki J N, Kamal A E. Routing techniques in wireless sensor networks:a survey[J]. Wireless Communications, IEEE,2004,11(6):6-28.
    [75]Ibriq J, Mahgoub I. Cluster-based routing in wireless sensor networks:issues and challenges:SPECTS,2004[C].
    [76]Vlajic N, Xia D. Wireless sensor networks:to cluster or not to cluster? Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks,2006[C]. IEEE Computer Society.
    [77]Singh S K, Singh M P, Singh D K. A survey of energy-efficient hierarchical cluster-based routing in wireless sensor networks[J]. International Journal of Advanced Networking and Application (IJANA),2010,2(02):570-580.
    [78]Schurgers C, Srivastava M B. Energy efficient routing in wireless sensor networks:Military Communications Conference,2001. MILCOM 2001. Communications for Network-Centric Operations:Creating the Information Force. IEEE,2001 [C]. IEEE.
    [79]Chan K S, Pishro-Nik H, Fekri F. Analysis of hierarchical algorithms for wireless sensor network routing protocols:Wireless Communications and Networking Conference,2005 IEEE,2005[C]. IEEE.
    [80]Wei D, Kaplan S, Chan H A. Energy efficient clustering algorithms for wireless sensor networks:Communications Workshops,2008. ICC Workshops'08. IEEE International Conference on,2008[C]. IEEE.
    [81]MAZINANI S M, CHITIZADEH J, YAGHMAEE M H, et al. NEW CLUSTERING SCHEMES FOR WIRELESS SENSOR NETWORKS [J]. HUM Engineering Journal,2010,11(1):51-69.
    [82]Lin L, Yan S, Nian Y. Distance Density Based Clustering Algorithm in Wireless Sensor Network[J]. Advanced Materials Research,2011,291:344-348.
    [83]Lotf J J, Bonab M N, Khorsandi S. A novel cluster-based routing protocol with extending lifetime for wireless sensor networks:Wireless and Optical Communications Networks,2008. WOCN'08.5th IFIP International Conference on,2008[C]. IEEE.
    [84]Yu Y, Govindan R, Estrin D. Geographical and energy aware routing:A recursive data dissemination protocol for wireless sensor networks[R].Citeseer, 2001.
    [85]张剑.基于OPNET仿真建模方法研究[D][D].武汉理工大学,2005.
    [86]孙利民.无线传感器网络[M].清华大学出版社有限公司,2005.
    [87]Ahmed M H, Alam S W, Qureshi N, et al. Security for WSN based on elliptic curve cryptography:Computer Networks and Information Technology (ICCNIT),2011 International Conference on,2011 [C]. IEEE.
    [88]Hankerson Darrel, Menezes Alfred, Vanstone Scott.椭圆曲线密码学导论[Z].北京:电子工业出版社,2005.
    [89]徐秋亮,李大兴.椭圆曲线密码体制[J].计算机研究与发展,1999,36(11):1281-1288.
    [90]程相国.基于双线性对的签名体制的研究[D].西安:西安电子科技大学,2006.
    [91]Fiat A. Batch rsa:Advances in Cryptology—CRYPTO'89 Proceedings, 1990[C]. Springer.
    [92]Camenisch J, Groth J. Group signatures:Better efficiency and new theoretical aspects[M]//Security in Communication Networks. Springer,2005:120-133.
    [93]Zhang C, Lu R, Lin X, et al. An efficient identity-based batch verification scheme for vehicular sensor networks:INFOCOM 2008. The 27th Conference on Computer Communications. IEEE,2008[C]. IEEE.
    [94]庞闻.ECC算法在数字签名中的应用[J].渭南师范学院学报,2006,2(21):41-43.
    [95]Wang C, Sohraby K, Li B, et al. A survey of transport protocols for wireless sensor networks[J]. Network, IEEE,2006,20(3):34-40.
    [96]Liu S, Tang Y, Liu Y. A survey of transport protocol for wireless sensor networks:Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on,2012[C]. IEEE.
    [97]Sang Y, Shen H, Inoguchi Y, et al. Secure data aggregation in wireless sensor networks:A survey:Parallel and Distributed Computing, Applications and Technologies,2006. PDCAT'06. Seventh International Conference on,2006[C]. IEEE.
    [98]Pereira P R, Grilo A, Rocha F, et al. End-to-end reliability in wireless sensor networks:Survey and research challenges:EuroFGI Workshop on IP QoS and Traffic Control,2007[C]. Citeseer.
    [99]Alzaid H, Foo E, Nieto J G. Secure data aggregation in wireless sensor network: a survey:Proceedings of the sixth Australasian conference on Information security-Volume 81,2008[C]. Australian Computer Society, Inc..
    [100]Pattem S, Krishnamachari B, Govindan R. The impact of spatial correlation on routing with compression in wireless sensor networks:Proceedings of the 3rd international symposium on Information processing in sensor networks, 2004[C]. ACM.
    [101]Madden S, Franklin M J, Hellerstein J M, et al. TAG:A tiny aggregation service for ad-hoc sensor networks[J]. ACM SIGOPS Operating Systems Review, 2002,36(SI):131-146.
    [102]高守玮,吴灿阳.ZigBee技术实践教程:基于CC2430/31的无线传感器网络解决方案[M].北京航空航天大学出版社,2009.
    [103]Healy M, Newe T, Lewis E. Wireless sensor node hardware:A review:Sensors, 2008 IEEE,2008[C]. IEEE.
    [104]Shepard S. RFID:radio frequency identification[M]. McGraw-Hill New York, 2005.
    [105]Camtepe S A, Yener B. Key distribution mechanisms for wireless sensor networks:a survey[J]. Rensselaer Polytechnic Institute, Troy, New York, Technical Report,2005:5-7.
    [106]Xiao Y, Rayi V K, Sun B, et al. A survey of key management schemes in wireless sensor networks[J]. Computer communications, 2007,30(11):2314-2341.
    [107]Xiao Y, Rayi V K, Sun B, et al. A survey of key management schemes in wireless sensor networks[J]. Computer communications, 2007,30(11):2314-2341.
    [108]Simplicio Jr M A, Barreto P S, Margi C B, et al. A survey on key management mechanisms for distributed Wireless Sensor Networks[J]. Computer Networks, 2010,54(15):2591-2612.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700